Score: 0

Bridging Threat Models and Detections: Formal Verification via CADP

Published: September 16, 2025 | arXiv ID: 2509.13035v1

By: Dumitru-Bogdan Prelipcean, Cătălin Dima

Potential Business Impact:

Checks if security rules catch real threats.

Business Areas:
Intrusion Detection Information Technology, Privacy and Security

Threat detection systems rely on rule-based logic to identify adversarial behaviors, yet the conformance of these rules to high-level threat models is rarely verified formally. We present a formal verification framework that models both detection logic and attack trees as labeled transition systems (LTSs), enabling automated conformance checking via bisimulation and weak trace inclusion. Detection rules specified in the Generic Threat Detection Language (GTDL, a general-purpose detection language we formalize in this work) are assigned a compositional operational semantics, and threat models expressed as attack trees are interpreted as LTSs through a structural trace semantics. Both representations are translated to LNT, a modeling language supported by the CADP toolbox. This common semantic domain enables systematic and automated verification of detection coverage. We evaluate our approach on real-world malware scenarios such as LokiBot and Emotet and provide scalability analysis through parametric synthetic models. Results confirm that our methodology identifies semantic mismatches between threat models and detection rules, supports iterative refinement, and scales to realistic threat landscapes.

Country of Origin
🇫🇷 France

Page Count
20 pages

Category
Computer Science:
Cryptography and Security